background

CYBERSECURITY
MATURITY
REPORT 2023

Download Full Report​

Increasing cybersecurity risk has a direct effect on business continuity. Recent cyberattacks created havoc, shutting down utilities, disrupting the supply of household goods, and forcing governments to respond with strong legislative action. How prepared are world industries to address today’s cyber risk? This report provides the answers.

Security Domains

Countries

Industries

Data Points

line

Nimrod Partush, CYE VP Data Science,describes the Cybersecurity Maturity Report 2023.

line

About the Report​

In this report, we break down data from hundreds of cyber assessments, covering 11 market sectors across 15 areas, to determine how well industries and countries address seven core security domains that make up a holistic cybersecurity posture.

 

The seven security domains

In this report, each category has been measured for its maturity across seven distinct security domains that make up a holistic cybersecurity strategy. Each domain plays a different role in the protection of critical assets inside of an organization.

 

The domains include:

  • Application level security
  • Cross organization policies, procedures, & governance
  • Identity management & remote access
  • Network level security
  • Security operations monitoring & incident response
  • Sensitive data & information management
  • Servers, network equipment & endpoint security

 

 

You’ll learn:

  • Which industries and countries stood out, and which still need to improve
  • How company size plays a role in cybersecurity maturity
  • The most significant vulnerabilities that are seen across all companies
line

Report Highlights

arrow

Security Domain: Application Level Security

Application level security maturity by country

graph graph

Most common vulnerabilities by percentage

21%

Technical information disclosure

17%

No HTTP strict transport security

15%

Missing HTTP security headers

10%

Frameable web content is vulnerable to clickjacking

7%

Data exposure in Robots.txt file

arrow

Security Domain:  Security Operations Monitoring  and Incident Response

Security operations monitoring and incident response by industry

graph graph

Most common vulnerabilities by percentage

28%

Insufficient monitoring of authentication events

25%

Insufficient monitoring of intrusive activities on endpoints

23%

Insufficient security monitoring procedures

6%

Insufficient monitoring of the corporate network

4%

Insufficient monitoring and protection of assets and services in AWS

quote icon

We believe that real cybersecurity maturity can only be achieved by cultivating a deep understanding of the global threat landscape and its implications on the business.

Reuven Aronashvili | CYE Founder & CEO

Award-Winning Technology and Team

Download the full report

Thank You

Your copy of the report is waiting in your inbox